-
Britain faces "real and credible" cyber threat: intelligence chief
In a rare public speech, Iain Lobban, director of the Government Communications Headquarters (GCHQ), said that there is a “real and credible” cyber threat to U.K. infrastructure, and that Britain’s economy could be at risk if effective protection against cyber attacks was not developed
-
-
Malware will soon steal behavioral patterns
Examples of malware which steals personal information are all around us, sometimes for the purpose of making it public and at other times for profit; computer scientists predict that a new generation of malware will mine social networks for people’s private patterns of behavior
-
-
Students think hacking is "cool"
A third of students surveyed thought that hacking was “cool,” and a similar number thought it was “easy”; the survey found that 37 percent had hacked Facebook accounts, 26 percent e-mail accounts, with 10 percent breaching online shopping accounts; an entrepreneurial 15 percent revealed that they hacked to make money
-
-
GTEC buys Zytel, bolstering cyber, intelligence capabilities
GTEC pays $26.8 millions in cash for Maryland-based Zytel; little is known about Zytel’s actual products — all the company’s work is classified and all employees are cleared at the Top Secret/Sensitive Compartmented Information level — but it develops cybersecurity and mission systems in support of the critical intelligence, counterterrorism, and cyber-warfare missions of its national-security clients
-
-
Smartphone security products begin to make it to market
A modern smartphone has many of the same capabilities as a PC and is way more vulnerable to certain kinds of attack; even so, few smartphone users see security apps as essential; Austrian security testing lab AV-Comparatives has justreleased a study comparing four smartphone security products
-
-
Shop Shield privacy protection expanded to IE browser
Experts say that the best way to assure the safety of financial and personal identifying information (PII) transmitted on the Internet, and prevent it from being lost, stolen, or misused, is to keep it private by not transmitting it to Web sites in the first place; Shop Shield allows consumers to engage in commercial transactions on the Web without giving these Web sites information such as e-mail addresses, passwords, usernames, phone numbers, billing addresses, credit card numbers, or other user payment information; Shop Shield even allows consumers to do business on the Web without giving out their names
-
-
House Cybersecurity Caucus launches new Web site
Billions of dollars are spent on cybersecurity; the House cybersecurity caucus has launched a new Web site, and observers say it could provide a valuable public service if it helps aggregate disparate activities and acts as a Federal cybersecurity information hub
-
-
Cyberthreat "deniers" say cybersecurity experts are crying wolf
There are those who argue that security experts warn about cyber threat are only scaring people in order to sell their security products and consulting services; one observer says: “To be sure, the financial interests of those warning about cybersecurity vulnerability should be disclosed, but their warnings shouldn’t be dismissed either— Just because you can still download movies from Netflix or update your Facebook status doesn’t mean everything’s fine”
-
-
Huntsville, Alabama, to become center for the war on cyber crimes
Mayor Tommy Battle unveiled plans to build the Cyber Center complex — a 52-building campus housing government agencies and academic teams dealing with cyber crimes
-
-
Move to IPv6 may create a "security nightmare"
IPv6, the Internet’s next-generation addressing scheme is so radically different from the current one that its adoption is likely to cause severe security headaches for those who adopt it; the radical overhaul still is not ready for prime time — in large part because IT professionals have not worked out a large number of security threats facing those who rely on it to route traffic over the net
-
-
Software vendors will be forced to fix vulnerabilities under deadline
Software vendors tend to take their time fixing security vulnerabilities discovered in their products; Zero Day Initiative, which serves as a broker between security researchers who find flaws and software companies who need to fix them, says there are 122 outstanding vulnerabilities that have been reported to vendors and which have not been patched yet; the oldest on the list was reported to IBM in May 2007 and more than thirty of the outstanding vulnerabilities are older than a year; Zero Day Initiative has just announced a new policy: vendors will now have six months to fix vulnerabilities, after which time the Zero Day Initiative will release limited details on the vulnerability, along with mitigation information so organizations and consumers who are at risk from the hole can protect themselves
-
-
Criminals, spies dominate cyber world, with little to deter them
White House cyber security coordinator Howard Schmidt says the U.S. economy essentially rests on safe Internet facilities; last year saw $10 trillion in online business, a figure forecast to hit $24 trillion in another decade, he noted; yet, incredibly, the business world has yet to grasp the threat that online thieves and vandals pose; almost half of small businesses don’t use antivirus software and even fewer use it properly, Schmidt warned
-
-
Worry: Hackers can take over power plants
In many cases, operating systems at power plants and other critical infrastructure are decades old; sometimes they are not completely separated from other computer networks used by companies to run administrative systems or even access the Internet; those links between the administrative networks and the control systems provide gateways for hackers to insert malicious codes, viruses, or worms into the programs that operate the plants
-
-
Commerce Department seeks comments on cybersecurity and its impact on innovation
The U.S. Commerce Department seeks comments from all stakeholders, including the commercial, academic and civil society sectors, on measures to improve cyber security while sustaining innovation; the department says that the Internet has become vitally important to U.S. innovation, prosperity, education, civic activity, and cultural life as well as aspects of America’s national security, and that a top priority of the department is to ensure that the Internet remains an open and trusted infrastructure, both for commercial entities and individuals
-
-
New identity theft scheme: stealing kids' Social Security numbers
The latest identity theft scheme: stealing kids’ Social Security numbers years before these kids grow up to use these numbers; the scheme allows people to establish phony credit and run up huge debts — debts that the kids may never be able to pay off
-
More headlines
Who's online
There are currently 0 users and 0 guests online.
The long view
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.